TY - JOUR
T1 - A secure end-to-end IoT solution
AU - Mathur, Avijit
AU - Newe, Thomas
AU - Elgenaidi, Walid
AU - Rao, Muzaffar
AU - Dooly, Gerard
AU - Toal, Daniel
N1 - Publisher Copyright:
© 2017 Elsevier B.V.
PY - 2017/8/15
Y1 - 2017/8/15
N2 - The Internet of Things (IoT) has been expanding in recent years with advancements in technologies, techniques and devices. This expansion has led to several different applications in the medical, civil, marine, military and domestic domains. Each of these domains have different requirements and challenges, with one common denominator: data security. Data security is an important aspect for any IoT network, however, in modern IoT systems simple data security may be not sufficient. This paper looks at a secure end-to-end IoT solution that allows wireless sensors/devices to connect to any PC in the world while guaranteeing data and network security. The scheme proposed in this paper can protect an IoT solution against several attacks like data breach, Denial of Service (DoS) and unauthorized access. Results obtained show that the technologies implemented, or used are superior in terms of time and energy consumption when compared to their counterparts in previously published works.
AB - The Internet of Things (IoT) has been expanding in recent years with advancements in technologies, techniques and devices. This expansion has led to several different applications in the medical, civil, marine, military and domestic domains. Each of these domains have different requirements and challenges, with one common denominator: data security. Data security is an important aspect for any IoT network, however, in modern IoT systems simple data security may be not sufficient. This paper looks at a secure end-to-end IoT solution that allows wireless sensors/devices to connect to any PC in the world while guaranteeing data and network security. The scheme proposed in this paper can protect an IoT solution against several attacks like data breach, Denial of Service (DoS) and unauthorized access. Results obtained show that the technologies implemented, or used are superior in terms of time and energy consumption when compared to their counterparts in previously published works.
KW - Data Breach
KW - ECDH (Elliptic Curve Diffie-Hellman)
KW - HKDF (HMAC based Key Derivation Function)
KW - Secure IoT
KW - Sensor networks
KW - WSN security
UR - http://www.scopus.com/inward/record.url?scp=85021703826&partnerID=8YFLogxK
U2 - 10.1016/j.sna.2017.06.019
DO - 10.1016/j.sna.2017.06.019
M3 - Article
AN - SCOPUS:85021703826
SN - 0924-4247
VL - 263
SP - 291
EP - 299
JO - Sensors and Actuators, A: Physical
JF - Sensors and Actuators, A: Physical
ER -